Showing posts with label Web. Show all posts
Showing posts with label Web. Show all posts

Wednesday, 20 February 2013

How To Hack Facebook Account ( also How To Protect Yours )





Methods To Hack Facebook ( Also To

 protect Your Account From this 

methods)


Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.
How to Protect Yourself
  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Use a Keylogger

Software Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.
Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.
How to Protect Yourself
  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type ofphishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
If you want to know how to do this, follow the detailed instructions onHacker9's website. Users are very careful now with logging into Facebook through other links, though, so that only adds to this already difficult process.
How to Protect Yourself
  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. Check the URL. If you're still doubtful, go directly to the main website and login the way you always do.
  • Phishing isn't only done through email. It can be any link on any website. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use an anti-virus like Norton or McAfee.

Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account.

Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.
From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.
How to Protect Yourself
  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies on HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking no matter what website you're on.



Follow These Steps And I assure You Can Hack The Facebook Account You Prefer...  Also Dont Forget to Comment If You liked The Idea...

Sunday, 16 December 2012

Malware detection goggles.


Malware detection goggles.







2012 is at its end … So what were the internet users doing on the net? Asking few users, they said it was the year of download(s) … and what were they downloading? MALWARES JJJ So it was the year of malwares! Now what’s next? Hey next is 2013 and do you want it to the year of malwares? All will say no, except some greedy folks whom build these malwares. But another question is that what can be done to stop 2013 from becoming the year of the malwares? Here are some points that I think we should follow to stop 2013 from becoming the year of the malwares:-
  • Link Watch: The weakest link in the security chain is often cited as humans. Social engineers try to gain access to your details using some common tricks. Be on lookout for these easy-to-spot signatures of such tricks, and you will not be bothered by malware.
  • URL: Whenever you enter your details, or download something, be sure to check the URL, specifically spot where the “.com” is located. For example, a URL such as www.aseaspot.blogspot.com=post1.com/post1 ... is actually a page hosted on [com=post1.com] and not on www.blogspot.com . Such a site could ask you to download a plug in to view a video/image/flash content etc, and inject a malware in that plug in. Also, these days you are logging in check the (https://) part whether it is https:// (Here in https://‘s’ stands for secured) or not, it is not safe to log in.
  • Money:  This was the most common email/sms scam of 2012.  It will seem that you have suddenly won a fortune, on account of an inheritance it goes a lottery win, help to transfer funds etc. and on the name of trusted companies like Nokia, Pepsi, LG etc. for e.g. – It will say you have won 300,000 pounds in “Nokia yearly lottery.”)  If you are being offered money for no proper season, report the mail as spam & ignore it the very moment you received/read it.  It is really very much odd; winning a lottery you did not enter is really inhuman.  There is no one who gives you money for no cause.  Earn easy money.
  • Charity:  This kind of scam happens usually through Ads. You will see ads that are showing poor kids and will ask money for there welfare or will say that A person earns 1000$ per day for (or anything) and will say you can also earn.  Cheque or donation can be asked for (even account details) in the name of Charity or for becoming member of these.   If you want to donate, donate directly using known official channels.   Also again & again I say that there is no body giving you easy money without any cause. 
  • Search Term Listing: These sites show up high on the ranking for almost any search term, and are just a bunch of pages that link from one listing to another, without directing you to a useful place.

So get ready to wear the malware detection specs use your common sense and follow these 5 points and you will not be bothered by any malware. 
Wait…. do I left something, in case please tell through your comments … I will be waiting for your comments …

How to hack Gmail Account?


How to hack Gmail Account?


If you are wondering why am I writing this … The reason is my Gmail was hacked on 30th November 2012. So I searched the ways to counter hack my Gmail Account and the first method I got was the most common method used by hackers: Phishing.


 Phishing is a technique in which we build a page, a fake Gmail like looking page and host it with a domain name similar to that of Gmail (www.gmail.com). You can any name like (www.gmale.com , www.gmial.com , www.gmael.com etc.) its up to you … and then set a mechanism that saves the Email address and the Password entered in your face Gmail page(s) ( To learn this in detail click here ). But the main problem with Phishing is that it can’t be used to hack your already hacked Gmail Account (So it was no Donut for me L). Next method that I came to know was Keylogger. 


Keylogging is a method that is defined by its name– Key (A key of keyboard) and logging (keeping it as a log). In Keylogging you have to set up a Keylogger (it is a software, not actually can be said a program) that will log (save) the keys that the person with the Gmail will hit while entering his/her password. But again it was useless for me L… As the keylogger can be set in a computer and can only log the keys hit in that very computer only. And then I found a method which was for me. It was by using Gmail hacking software.


 Just download the software and run it and type the email address you want to hack and then all you have to do is to wait till the software finds the password of the email address ( I don’t know how it does). But it also has a problem, there are plenty of Gmail hacking softwares and we don’t know the trusted one and most of them are malwares. So I thought not to try this. Now you’ll be wondering how I got my Gmail back. I didn’t do anything, my Gmail was hacked by one of my friends and when I asked him the reason, he said, “I saw your Gmail Account in a Café and it was not logged out, so I changed its password and logged it out” I don’t know whether he is saying the truth or not, but who cares I got my Gmail backJ. In the search for the method to hack a Gmail Account, the most lucrative option I got was Gmail Hacking software but it is also unsafeL My search is Still not over … If you know a better method please tell me through the comments section. I’ll be waiting for your comments…..

Thursday, 22 November 2012

What-When-Which-Why-Who-How(s) of contextual advertising.


Contextual Advertising


What is Contextual advertising ?

=> Contextual advertising enables advertisers to display ads that closely match with the           text  or the content on your website/blog.

When can we serve these ads and earn money from it ?

=> Anytime, if You have a space (blog/website) in the web that meets with the criteria required by the ad network you choose . 

Which is the most paying ad network ?

=> When it comes to most paying, nobody can ignore the most famous of these ad networks : Google's AdSense program. But success with AdSense program is not guaranteed and it is advisable to try other Ad networks; it also helps to determine which one works best for you . 

Why choose contextual ads ?

=> Contextual ads are Banners/text/inline ads that are usually based on CPC or PPC ( cost per click or pay per click ) . That is ad revenue is calculated based on each visitor who clicks on the ad links that you serve . 

Who provides this types of ads ?

=> Well there are plenty of ad networks providing these contextual ads. 
Links of some of the famous ad networks providing these ad networks are ..

Google Adsense

Yahoo Publisher Network

Clicksor

Blogads

How can we succeed with contextual ads ?

=> You can succeed with these ad if your blog/website is primarily an information only Blog/website or if you are promoting a specific product or a range of product it can be useful to you. 

Tuesday, 13 November 2012

Earn From Your Facebook Account !!

Yes Its True You Can Earn Money From Your Status Updates . Adf.ly Is a Free Service That You Can Use ... 






So , All You Have To Do Is Just Join It And Start Earning Today !!


Saturday, 27 October 2012

Domains By Country


Domains by Country

CountryDomain

Afghanistanaf
Albaniaal
Algeriadz
American Samoaas
Andorraad
Angolaao
Anguillaai
Antarcticaaq
Antigua and Barbudaag
Argentinaar
Armeniaam
Arubaaw
Ascension Islandac
Australiaau
Austriaat
Azerbaijanaz
Bahrainbh
Bangladeshbd
Barbadosbb
Belarusby
Belgiumbe
Belizebz
Beninbj
Bermudabm
Bhutanbt
Boliviabo
Bosnia and Herzegowinaba
Botswanabw
Bouvet Islandbv
Brazilbr
British Indian Ocean Territoryio
Bruneibn
Bulgariabg
Burkina Fasobf
Burundibi
Cambodiakh
Camerooncm
Canadaca
Cape Verdecv
Central African Republiccf
Chadtd
Channel Islands, Guernseygg
Channel Islands, Jerseyje
Chilecl
Chinacn
Christmas Islandcx
Cocos (Keeling) Islandscc
Colombiaco
Comoroskm
Congocg
Congo, Democratic Republic ofcd
Cook Islandsck
Costa Ricacr
Cote d'Ivoireci
Croatiahr
Cubacu
Cypruscy
Czech Republiccz
Denmarkdk
Djiboutidj
Dominicadm
Dominican Republicdo
East Timortp
Ecuadorec
Egypteg
El Salvadorsv
Equatorial Guineagq
Eritreaer
Estoniaee
Ethiopiaet
Falkland Islandsfk
Faroe Islandsfo
Fijifj
Finlandfi
Francefr
French Guianagf
French Polynesiapf
French Southern Territoriestf
French, Metropolitanfx
Gabonga
Gambiagm
Georgiage
Germanyde
Ghanagh
Gibraltargi
Greecegr
Greenlandgl
Grenadagd
Guadeloupegp
Guamgu
Guatemalagt
Guineagn
Guinea-Bissaugw
Guyanagy
Haitiht
Heard and McDonald Islandshm
Hondurashn
Hong Konghk
Hungaryhu
Icelandis
Indiain
Indonesiaid
Iranir
Iraqiq
Irelandie
Isle of Manim
Israelil
Italyit
Jamaicajm
Japanjp
Jordanjo
Kazakhstankz
Kenyake
Kiribatiki
Korea, Democratic People's Republic ofkp
Korea, Republic ofkr
Kuwaitkw
Kyrgyzstankg
Laosla
Latvialv
Lebanonlb
Lesothols
Liberialr
Libyan Arab Jamahiriyaly
Liechtensteinli
Lithuanialt
Luxembourglu
Macaomo
Macedoniamk
Madagascarmg
Malawimw
Malaysiamy
Maldivesmv
Maliml
Maltamt
Marshall Islandsmh
Martiniquemq
Mauritaniamr
Mauritiusmu
Mayotteyt
Mexicomx
Micronesiafm
Moldovamd
Monacomc
Mongoliamn
Montserratms
Moroccoma
Mozambiquemz
Myanmarmm
Namibiana
Naurunr
Nepalnp
Netherlandsnl
Netherlands Antillesan
New Caledonianc
New Zealandnz
Nicaraguani
Nigerne
Nigeriang
Niuenu
Norfolk Islandnf
Northern Mariana Islandsmp
Norwayno
Omanom
Pakistanpk
Palaupw
Panamapa
Papua New Guineapg
Paraguaypy
Perupe
Philippinesph
Pitcairnpn
Polandpl
Portugalpt
Puerto Ricopr
Qatarqa
Reunionre
Romaniaro
Russiaru
Rwandarw
Saint Kitts and Neviskn
Saint Lucialc
Saint Vincent and the Grenadinesvc
Samoaws
San Marinosm
Sao Tome and Principest
Saudi Arabiasa
Senegalsn
Seychellessc
Sierra Leonesl
Singaporesg
Slovakiask
Sloveniasi
Solomon Islandssb
Somaliaso
South Africaza
South Georgia and the South Sandwich Islandsgs
Spaines
Sri Lankalk
St. Helenash
St. Pierre and Miquelonpm
Sudansd
Surinamesr
Svalbard and Jan Mayen Islandssj
Swazilandsz
Swedense
Switzerlandch
Syriasy
Taiwantw
Tajikistantj
Tanzaniatz
Thailandth
The Bahamasbs
The Cayman Islandsky
Togotg
Tokelautk
Tongato
Trinidad and Tobagott
Tunisiatn
Turkeytr
Turkmenistantm
Turks and Caicos Islandstc
Tuvalutv
Ugandaug
Ukraineua
United Arab Emiratesae
United Kingdomuk
United Statesus
United States Minor Outlying Islandsum
Uruguayuy
Uzbekistanuz
Vanuatuvu
Vatican City Stateva
Venezuelave
Vietnamvn
Virgin Islands (British)vg
Virgin Islands (US)vi
Wallis and Futuna Islandswf
Western Saharaeh
Yemenye
Yugoslaviayu
Zambiazm
Zimbabwezw

Most Visited.

Web (6) Tips and Tricks (5) news (5) Reviews (2) Science (2) Films (1) Games (1) Mobile (1) Sports (1) Technology (1) education (1) health (1) videos (1)